曰韩免费_91久久精品国产亚洲_一区二区成人影院_九一视频在线免费观看_91国视频_亚洲成人中文在线

职称英语理工类A级阅读理解题必备练习

雕龙文库 分享 时间: 收藏本文

职称英语理工类A级阅读理解题必备练习

  People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.  Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place.  A to show that a hacker is more dangerous than a thief.  C to demand that a protective computer system should be set up against thieves.  37 The word vandalizing in Line 17 means  B creating.  D updating,  A Hacking is also known as computer break-in.  C Hacking is a widespread concern.  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?  B Shutting down the computer whenever he wishes.  D Spoiling a system for air traffic.  A it will cause fear among the public.  C tough measures are illegal.  【参考答案】36. A37. C38. B39. C40. D

  

  People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.  Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place.  A to show that a hacker is more dangerous than a thief.  C to demand that a protective computer system should be set up against thieves.  37 The word vandalizing in Line 17 means  B creating.  D updating,  A Hacking is also known as computer break-in.  C Hacking is a widespread concern.  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?  B Shutting down the computer whenever he wishes.  D Spoiling a system for air traffic.  A it will cause fear among the public.  C tough measures are illegal.  【参考答案】36. A37. C38. B39. C40. D

  

主站蜘蛛池模板: 色偷偷综合网 | 天天操夜夜干 | 国产在线精品福利大全 | 丁香美女社区 | 国产精品亚洲欧美日韩久久 | 毛片免 | 久久精品123| 日韩 欧美 亚洲 | 无码熟妇人妻av在线影片 | 深夜福利影院 | 免费骚视频 | 色综合欧美色综合七久久 | 亚洲国产精品线路久久 | 超级碰碰色偷偷免费视频 | 人人狠狠综合久久亚洲 | 99热免费在线观看 | 看全色黄大色大片免费久久久 | 久久伊人一区二区三区四区 | 久久综合精品国产一区二区三区无 | 人妻熟女一二三区夜夜爱 | 精品久久久久久中文字幕人妻最新 | 一区二区三区在线视频观看 | 成人免费黄色小视频 | 国产精品videossex激情 | a一级网站| 国内大量揄拍人妻在线视频 | 日本黄色激情视频 | 日韩精品国产精品 | 成人亚洲电影 | 韩国一级淫片视频免费播放 | 成人久久18免费网址 | 国模吧无码一区二区三区 | 久久久久综合网 | swag国产精品一区二区 | 久久国产精品视频一区 | 黄色小视频在线免费观看 | 久久精品亚洲中文字幕无码麻豆 | 大帝av在线一区二区三区 | 国产精品视频一区二区三区小说 | 国产精品丝袜视频 | 久久机热这里只有精品 |